default search action
Abdallah M'hamed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j6]Leye Wang, Daqing Zhang, Yasha Wang, Chao Chen, Xiao Han, Abdallah M'hamed:
Sparse mobile crowdsensing: challenges and opportunities. IEEE Commun. Mag. 54(7): 161-167 (2016) - 2014
- [j5]Meriem Zerkouk, Paulo Cavalcante, Abdallah Mhamed, Jérôme Boudy, Belhadri Messabih:
Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance. Mob. Networks Appl. 19(3): 392-403 (2014) - 2013
- [j4]Anas El Husseini, Abdallah M'hamed, Bachar El-Hassan, Mounir Mokhtari:
Trust-based authentication scheme with user rating for low-resource devices in smart environments. Pers. Ubiquitous Comput. 17(5): 1013-1023 (2013) - [c14]Abdallah Mhamed, Meriem Zerkouk, Anas El Husseini, Belhadri Messabih, Bachar El-Hassan:
Towards a Context Aware Modeling of Trust and Access Control Based on the User Behavior and Capabilities. ICOST 2013: 69-76 - [i1]Meriem Zerkouk, Abdallah Mhamed, Belhadri Messabih:
A user profile based access control model and architecture. CoRR abs/1302.1667 (2013) - 2011
- [c13]Anas El Husseini, Abdallah M'hamed, Bachar El-Hassan, Mounir Mokhtari:
A Novel Trust-Based Authentication Scheme for Low-Resource Devices in Smart Environments. ANT/MobiWIS 2011: 362-369 - 2010
- [j3]Benamar Kadri, Mohammed Feham, Abdallah M'hamed:
Lightweight PKI for WSN uPKI. Int. J. Netw. Secur. 10(3): 194-200 (2010) - [c12]Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan, Mounir Mokhtari:
A Flexible Privacy and Trust Based Context-Aware Secure Framework. ICOST 2010: 17-23
2000 – 2009
- 2009
- [j2]Mounis Khatib, Abdallah M'hamed, Hossam Afifi:
An on-demand key establishment protocol for MANETs. Int. J. Wirel. Mob. Comput. 3(3): 123-132 (2009) - [j1]Benamar Kadri, Mohammed Feham, Abdallah M'hamed:
Securing reactive routing protocols in MANETs using PKI (PKI-DSR). Secur. Commun. Networks 2(4): 341-350 (2009) - [c11]Mahmoud Ghorbel, Mounis Khatib, Abdallah Mhamed, Mounir Mokhtari:
Secured and Trusted Service Provision in Pervasive Environment. WiMob 2009: 400-405 - 2008
- [c10]Pierre E. Abi-Char, Mounir Mokhtari, Abdallah Mhamed, Bachar El-Hassan:
Towards a robust privacy and anonymity preserving architecture for ubiquitous computing. CRiSIS 2008: 125-132 - [c9]Nadia Chalabi, Abdallah Mhamed, Belhadri Messabih:
Towards a new user Anonymity Preserving Protocol (APP) for MANETs. CRiSIS 2008: 243-248 - 2007
- [c8]Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan:
A Secure Authenticated Key Agreement Protocol For Wireless Security. IAS 2007: 33-38 - [c7]Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan:
A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography. IAS 2007: 89-94 - [c6]Mounis Khatib, Ghazi Al Sukkar, Abdallah M'hamed:
Data Flow Attack Detection Mechanism for PARTY Protocol. ICNS 2007: 85 - [c5]Abdallah Mhamed, Cecilia Fred, Arab Farah:
An Authentication Architecture Dedicated to Dependent People in Smart Environments. ICOST 2007: 90-98 - [c4]Daqing Zhang, Abdallah Mhamed, Mounir Mokhtari:
A trustworthy framework for impromptu service discovery with mobile devices. Mobility Conference 2007: 254-260 - [c3]Mounis Khatib, Ghazi Al Sukkar, Abdallah Mhamed, Mounir Mokhtari:
Token-based solution to secure PARTY protocol for self - organized networks. MWCN 2007: 41-45 - 2004
- [c2]Miguel Franklin de Castro, Dominique Gaïti, Abdallah M'hamed:
Adaptive QoS Management for Regulation of Fairness Among Internet Applications. ICT 2004: 257-266 - 2003
- [c1]Miguel Franklin de Castro, Abdallah M'hamed, Dominique Gaïti, Mauro Oliveira:
Simulated Internet Traffic Behavior under Different QoS Management Scenarios. ISCC 2003: 320-326
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint